F-SECURE ANTI-VIRUS - FOR MICROSOFT EXCHANGE Deployment Manual - page 5
3
A.2.4 Creating the Quarantine Storage for a Continuous
Cluster Replication Environment ....................................................................85
A.2.5 Creating the Quarantine Storage for a Database
Availability Group Environment ......................................................................89
A.3 Installing the Product..................................................................................................93
A.3.1 Installing on Clusters with Quarantine as Cluster Resource ..........................93
A.3.2 Installing on Clusters with Quarantine on a Dedicated Computer ..................96
A.4 Administering the Cluster Installation with F-Secure Policy Manager........................98
A.5 Using the Quarantine in the Cluster Installation.........................................................99
A.6 Using the Product with High Availability
Architecture in Microsoft Exchange Server 2010101
A.7 Uninstallation............................................................................................................102
A.8 Troubleshooting .......................................................................................................102
Appendix B Services and Processes
103
B.1 List of Services and Processes ............................................................................... 104
Technical Support
108
F-Secure Online Support Resources ............................................................................... 109
Web Club .........................................................................................................................111
Virus Descriptions on the Web .........................................................................................111
About F-Secure Corporation